5 research outputs found
Intelligence and Security Informatics
The book constitutes the proceedings of the First European Conference on Intelligence and Security Informatics, EuroISI 2008
Intelligence and security informatics (ISI) is a multidisciplinary field encompassing methodologies, models, algorithms, and advanced tools for intelligence analysis, homeland security, terrorism research as well as security-related public policies. These proceedings contain 25 original papers, out of 48 submissions received, related to the topics of intelligence and security informatics. These papers cover a broad range of fields such as: social network analysis, knowledge discovery, web-based intelligence and analysis, privacy protection, access control, digital rights management, malware and intrusion detection, surveillance, crisis management, and computational intelligence, among others.JRC.G.2-Support to external securit
Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests
The ICT security assessment of critical infrastructures is nowadays a prominent problem. All the existing risk assessment methodologies
require, in order to be effective, to be fed with real data regarding the functioning and the behavior of the system under analysis, the results and the effects of the possible cyber-attacks etc. Unfortunately the availability of such data is scarce and the unique way to obtain them is by conducing on-field experiments. In this paper we present a methodology which define, step by step, how to conduce, in a systematic,rigorous and Galilean way, experimental ICT security tests.JRC.G.6-Sensors, radar technologies and cybersecurit
Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests
The security assessment of the ICT components of critical infrastructures is nowadays a prominent problem. Risk assessment methodologies require, in order to be effective, to be fed with data regarding the functioning and the behavior of the system under analysis, the potential vulnerabilities, the results and the effects of the possible cyber-attacks etc. Unfortunately the availability of security data coming from the field is scarce, mainly due to business confidentiality reasons. Therefore, there is an urgent need for alternative data sources. The solution is to conduct security experiments, with off-line systems or in laboratories with realistic emulation of the target systems. In this paper we present a methodology that defines, step by step, how to conduct, in a systematic and rigorous way, experimental ICT security tests.JRC.G.6-Security technology assessmen